Muhammad Naeem Noor Khan interrogated. [Source: BBC's "The New Al-Qaeda."]Muhammad Naeem Noor Khan, a young Pakistani, is arrested in Lahore after six weeks of surveillance by Pakistani authorities in conjunction with US intelligence agencies. The US and Pakistanis learned of Noor Khan after arresting another al-Qaeda suspect, Musaad Aruchi, a month before (see June 12, 2004), and they had been tracking him since then. Noor Khan is taken to a high-security prison by Pakistani authorities, who resisted pressure from the CIA to let them completely handle the operation. [Guardian, 8/8/2004] American intelligence agents find what they later call a “treasure trove” of information in Noor Khan’s computers and documents. [CNN, 8/2/2004] Khan is a communications hub of sorts for al-Qaeda. He is in frequent contact with dozens of other al-Qaeda terrorists around the world and passing messages back and forth from more senior al-Qaeda operatives. Former National Security Council official Gideon Rose will later say, “It is obviously a very serious victory. It is obvious that there is a real find here.” [Guardian, 8/8/2004] Khan, who speaks fluent English, is not just a center for expediting clandestine communications between al-Qaeda leaders and their underlings, but also handles and collates documents, reports, maps, and other information, and sometimes performs his own intelligence-gathering, usually on trips to Britain. [MSNBC, 8/8/2004] Khan’s computer contains detailed surveillance information about five US buildings—the Stock Exchange and Citigroup’s headquarters in New York City, the Prudential building in Newark, and the International Monetary Fund and World Bank headquarters in Washington—all possible targets for future al-Qaeda attacks, though the information is all from 2000 and 2001. Other sites in New York City and San Francisco are mentioned, and meticulous information about London’s Heathrow Airport is also found. Pakistani intelligence officials believe that the information indicates a “present” threat, and so inform their US counterparts. Later in the month, the Pakistanis convince Khan to “turn,” or become a double agent. Khan will subsequently send e-mails to dozens of operatives all requesting that they contact him immediately (see July 24-25, 2004). [Guardian, 8/8/2004]

On July 13, 2004, a young Pakistani al-Qaeda operative named Muhammad Naeem Noor Khan was arrested in Pakistan (see July 13, 2004). US intelligence agents find what they later call a “treasure trove” of information in Noor Khan’s computers and documents. [CNN, 8/2/2004] They realize that Khan has served as a communications hub of sorts for al-Qaeda. He is in frequent contact with dozens of other al-Qaeda terrorists around the world and passing messages back and forth from more senior al-Qaeda operatives. Intelligence agents quickly realize that, through Khan, they can penetrate deep into the core of al-Qaeda’s current operations. Around the weekend of July 24-25, the Pakistanis convince Khan to “turn,” or become a double agent. Khan sends e-mails to dozens of activists in Indonesia, Malaysia, Pakistan, India, Bangladesh, and other countries. He requests that they contact him immediately and reveal where they are. As the emails come back, intelligence agents all over the world go into action to monitor those who have replied to Khan. [Guardian, 8/8/2004] Newsweek later reports that he sends e-mails to at least six contacts in the US, but the results of this are unknown. A senior US intelligence official confirms that Khan contacted people in the US, but believes number is less than six. [MSNBC, 8/8/2004] Some of Khan’s contacts are quickly arrested, including Ahmed Khalfan Ghailani, a Tanzanian wanted since 1998 for his role in the bombing of the US embassy in his home country (see July 25-29, 2004). [Suskind, 2006] Some communications take time to reach him. He is sometimes sent handwritten notes or computer discs from the mountains where bin Laden and other top leaders are hiding out. These are delivered by secretive relays of couriers who never see each other, using dead drops to avoid being traced. Other messages come from far-flung intermediaries who forward e-mail without knowing what it means, where it is going, or who is sending it. [MSNBC, 8/8/2004] However, on August 1, Bush administration officials leak Noor Khan’s name to the press and the New York Times prints his name one day later. This only gives one week for the sting operation to work. Intelligence officials are crushed the operation has to end before it could expose many more al-Qaeda operatives (see August 2, 2004).

Ahmed Khalfan Ghailani. [Source: FBI]Ahmed Khalfan Ghailani, a high-level al-Qaeda operative from Tanzania suspected of participating in the 1998 bombings of US embassies in East Africa, is captured in Gujrat, Pakistan, after a violent standoff with Pakistani police. [CNN, 8/3/2004] Ghailani’s arrest is publicly announced on July 29, four days later. The announcement by Pakistan’s Interior Minister Faisal Hayat is made in an unusual late-night press conference that takes place just hours before John Kerry accepts the Democratic nomination for president. [Salon, 8/17/2004] Pakistani authorities say the announcement of Ghailani’s arrest was delayed four days because of the need to confirm his identity before making the proclamation. [BBC, 7/30/2004] But former Pakistani official Husain Haqqani later claims the announcement was timed to upstage the Kerry speech. [Salon, 8/17/2004; United States Conference on International Religious Freedom, 6/30/2005] An article in the New Republic published earlier in the month reported that the Bush administration was asking Pakistan to make high-profile arrests of al-Qaeda suspects during the Democratic National Convention in order to redirect US media attention from the nomination of John Kerry (see July 8, 2004). [New Republic, 7/29/2004] John Judis, who co-wrote the article predicting such an arrest, says the day after the arrest is announced, “Well, the latest development pretty much confirms what we wrote in the article, which is that there was pressure for Pakistan to produce a high-value target during the last 10 days of July and to announce that arrest.” He also asks why is it “they announced [the arrest] at all? Because when you have somebody who’s been in hiding since 1998, they have an enormous amount of information and contacts. By announcing this guy’s arrest, what you do is you warn off everybody who’s been associated with him from the last five or six years. You tell them that they better get their act together or they are going to be found. So, there’s some, really a lot of questions of why they announced this thing when they did.… It may be in this case that we—that we, and the Pakistanis got somebody and prematurely announced this person’s arrest in order to have an electoral impact.” [Democracy Now!, 7/30/2004]

The Bush administration issues a terror alert in the wake of the Democratic presidential convention, which ended on July 29, 2004. New Code Orange alerts are put into effect for New York City, Newark, and Washington, DC. Homeland Security Director Tom Ridge says, “Now this afternoon, we do have new and unusually specific information about where al-Qaeda would like to attack.… Compared to previous threat reporting, these intelligence reports have provided a level of detail that is very specific. The quality of this intelligence, based on multiple reporting streams in multiple locations, is rarely seen and it is alarming in both the amount and specificity of the information.… As of now, this is what we know: reports indicate that al-Qaeda is targeting several specific buildings, including the International Monetary Fund and World Bank in the District of Columbia; Prudential Financial in Northern New Jersey; and Citigroup buildings and the New York Stock Exchange in New York.” [Department of Homeland Security, 8/1/2004; Washington Post, 8/3/2004] But Ridge fails to mention that the so-called “casing disks” are from 2000 and 2001, nor does he discuss the fact that the decision on whether to issue the alerts had been hotly debated by officials over the weekend. Within 24 hours, the age of the intelligence is leaked, causing a controversy about the merit and urgency of the orange alert. [Suskind, 2006, pp. 325-326] The next day it will be revealed that the warning was based on information from the computer of recently captured al-Qaeda operative Muhammad Naeem Noor Khan (see August 2, 2004). President Bush and his top advisors learned of the arrest and subsequent “turning” of Noor Khan just the day before. They decide to publicize an alert based on data captured with Noor Khan, even though doing so could jeopardize a sting operation launched just days earlier in which Noor Khan is contacting dozens of al-Qaeda operatives around the world (see July 24-25, 2004). [Guardian, 8/8/2004] But even though Khan was arrested just weeks before, one senior law enforcement official who was briefed on the alert says, “There is nothing right now that we’re hearing that is new. Why did we go to this level?… I still don’t know that.” Homeland Security officials admit that that there is no indication that any terrorist action was imminent. “What we’ve uncovered is a collection operation as opposed to the launching of an attack,” says one. However, administration officials insist that even three-year-old intelligence, when coupled with other information about al-Qaeda’s plans to attack the US, justifies the security response in the three cities. President Bush says of the alerts, “It’s serious business. I mean, we wouldn’t be, you know, contacting authorities at the local level unless something was real.” A senior counterterrorism official says, “Most of the information is very dated but you clearly have targets with enough specificity, and that pushed it over the edge. You’ve got the Republican convention coming up, the Olympics, the elections…. I think there was a feeling that we should err on the side of caution even if it’s not clear that anything is new.” [Washington Post, 8/3/2004] Former Democratic presidential candidate Howard Dean says he worries “every time something happens that’s not good for President Bush, he plays this trump card, which is terrorism. It’s just impossible to know how much of this is real and how much of this is politics, and I suspect there’s some of both.” But conservatives defend the alert and Democratic presidential candidate John Kerry swiftly moves to disassociate his campaign from Dean’s remarks. [New York Observer, 8/4/2007] Author William Rivers Pitt points out that Laura Bush and daughters Barbara and Jenna make high-profile visits to the Citigroup Center in New York City on the first day of Ridge’s new orange alert. Noting this was one of the target buildings, Pitt asks, “George W. Bush sent his entire family to the very place that was supposedly about to be blown to smithereens?” Pitt concludes, “Bush and his administration officials are using terrorism—the fear of it, the fight against it—to manipulate domestic American politics. They are, as they have every day for almost three years now, using September 11 against their own people.” [Truthout (.org), 8/4/2004]

Muhammad Naeem Noor Khan. [Source: BBC]The New York Times reveals the identity of al-Qaeda operative Muhammad Naeem Noor Khan. Bush administration officials allegedly revealed his name to the Times in an attempt to defend a controversial US terror alert issued the day before (see August 1, 2004). [Associated Press, 8/10/2004; Suskind, 2006, pp. 325-326] Officials from the Department of Homeland Security apparently gave out the name without revealing that Khan had already been turned and was helping to catch other al-Qaeda operatives. [Daily Times (Lahore), 8/8/2004] A few days later, National Security Adviser Condoleezza Rice confirms that US officials named Khan to the reporters “on background.” [Boston Globe, 8/10/2004] But some days after that, anonymous Pakistani government sources will claim that Khan’s name was initially leaked by Pakistani officials. [Salon, 8/17/2004] Middle East expert Juan Cole suggests both accounts have merit. In the hours after the August 1 terror alert that was based on information secured from Khan’s computer, reporters scramble to determine the source of the alert. One reporter learns of the Khan arrest from a CIA analyst, though the analyst refuses to give out any names. Cole believes that New York Times reporter David Rohde then acquires Khan’s name from his Pakistani sources and confirms it through US sources at the Department of Homeland Security. [Antiwar.com, 8/19/2004] Khan, an al-Qaeda computer expert, was arrested in Pakistan on July 13 and quickly began cooperating with investigators. He started sending e-mails to other operatives around the world and asked them to report back in. As they replied, investigators began tracing their locations. But Khan’s name is revealed before his computer contacts could be fully exploited. Many al-Qaeda members, including some suspected plotters planning strikes on US targets, escape arrest because of the outing. One Pakistani official says, “Let me say that this intelligence leak jeopardized our plan and some al-Qaeda suspects ran away.” [Associated Press, 8/10/2004; Suskind, 2006, pp. 325-326] Intelligence reports also indicate that the exposure of Khan makes al-Qaeda members more cautious in their electronic communications. Many cells abruptly move their hideouts, causing the US losing track of them. [Salon, 8/9/2004; Village Voice, 8/2/2005] Some are critical about the leak of Khan’s name: Tim Ripley, a security expert who writes for Jane’s Defense publications, says, “The whole thing smacks of either incompetence or worse. You have to ask: what are they doing compromising a deep mole within al-Qaeda, when it’s so difficult to get these guys in there in the first place? It goes against all the rules of counterespionage, counterterrorism, running agents, and so forth. It’s not exactly cloak and dagger undercover work if it’s on the front pages every time there’s a development, is it?” British Home Secretary David Blunkett is openly contemptuous of the White House’s management of the information. “In the United States there is often high-profile commentary followed, as in the current case, by detailed scrutiny, with the potential risk of ridicule. Is it really the job of a senior cabinet minister in charge of counter-terrorism to feed the media? To increase concern? Of course not. This is arrant nonsense.” [Salon, 8/9/2004] Other high-level British officials are “dismayed by the nakedly political use made of recent intelligence breakthroughs both in the US and in Pakistan.” They complain that they had to act precipitously in arresting low-level al-Qaeda figures connected to Khan instead of using those suspects to ferret out more senior al-Qaeda figures. These officials are “dismayed by the nakedly political use made of recent intelligence breakthroughs both in the US and in Pakistan.” [New York Observer, 8/11/2004] Senator Charles Schumer (D-NY) writes in a letter to Bush officials, “I respectfully request an explanation [about] who leaked this Mr. Khan’s name, for what reason it was leaked, and whether the British and Pakistani reports that this leak compromised future intelligence activity are accurate.” [Boston Globe, 8/10/2004] Senator George Allen (R-VA) says, “In this situation, in my view, they should have kept their mouth shut and just said, ‘We have information, trust us’.” [Inter Press Service, 8/10/2004] Middle East expert Juan Cole notes that the leak of Khan’s name forced the British to arrest 12 members of an al-Qaeda cell prematurely, allowing others to escape. “[T]his slip is a major screw-up that casts the gravest doubts on the competency of the administration to fight a war on terror. Either the motive was political calculation, or it was sheer stupidity. They don’t deserve to be in power either way.” [Daily Times (Lahore), 8/8/2004] Salon’s Dale Davis says, “[S]adly, the damage [the Bush administration’s] machinations have caused to the goal of defeating al-Qaeda will be measured in the loss of the young American servicemen and women who carry the burden of their failed policies.” [Salon, 8/13/2004]

Muhammad Naeem Noor Khan. [Source: Agence France-Presse / Getty Images]Muhammad Naeem Noor Khan, an al-Qaeda computer expert, is released in Pakistan. He had been arrested in July 2004 (see July 13, 2004) and was quickly turned, sending out e-mails to help out dozens of al-Qaeda operatives around the world before his name was leaked to the press (see July 24-25, 2004 and August 2, 2004). He was held for three years by Pakistan’s intelligence agencies. He was never charged with any crime and apparently there are no plans to charge him in the future. He is said to be living with his parents in Karachi, Pakistan. He is being closely monitored and the media is not allowed to speak with him. US and British officials and analysts express dismay at Noor Khan’s quick release. Seth Jones of the Rand Corporation says, “I find it strange and baffling.… He presents a major threat to the West.” [Guardian, 8/23/2007] Former counterterrorism “tsar” Richard Clarke says, “Khan may have bargained for an early release because he cooperated.” [ABC News, 8/21/2007] But his release also comes at a time when Pakistan’s judiciary is releasing dozens of suspected Islamic militants and government critics who have been held without trial. This is seen as a sign of President Pervez Musharraf’s eroding influence after public protests forced him to reinstate Pakistan’s chief justice. [London Times, 8/23/2007] One former intelligence official says that Khan’s case is a “murky tale” in which there are “no clear answers.” [Guardian, 8/23/2007]

Ordering

Time period

Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.Contact Us